LEMON Manuals: Even more car manuals for everyone: 1960-2025
Home >> Jeep >> 2001 >> Cherokee Limited, RWD >> Repair and Diagnosis >> Body & Frame >> Body, Cab Control Systems >> Body Control Modules >> Verification Tests >> Body Verification Test
April 5, 2026: LEMON Manuals is launched! Read the announcement.

Body Verification Test

NOTE: If 3 attempts are made to place Sentry Key Immobilizer Module (SKIM) in secured access mode using incorrect Personal Identification Number (PIN), secured access mode will be locked out for one hour. To exit lockout mode, turn ignition switch to ON position for one hour. Connect battery charger if necessary.
NOTE: Secured access mode is not required to check status of programmed sentry key. If Powertrain Control Module (PCM) is replaced, secret key data must be transferred from Sentry Key Immobilizer Module (SKIM) to PCM. SKIM will have to be placed in secured access mode.
  1. Inspect vehicle to ensure all engine components are connected. Reassemble and reconnect components as necessary. If Sentry Key Immobilizer Module (SKIM) was replaced, go to step  3 . If Powertrain Control Module (PCM) was replaced, perform POWERTRAIN VERIFICATION TEST VER-2  . Once verification test has been performed, return to step  3 . If SKIM and/or PCM were not replaced, go to next step.
  2. If Remote Keyless Entry (RKE) module was replaced, using scan tool, select THEFT ALARM, VTSS, MISCELLANEOUS and PROGRAM RKE. Program all transmitters for vehicle, see REMOTE KEYLESS ENTRY (RKE)  under PROGRAMMING. Proceed to step  8 .
  3. Obtain vehicle Personal Identification Number (PIN) assigned to original SKIM. This number can be found on vehicle invoice or calling Chrysler customer center.
  4. Using scan tool, select THEFT ALARM, SKIM MISCELLANEOUS and SKIM MODULE REPLACED. Enter SECURED ACCESS mode using unique 4 digit PIN.
  5. Program country code into SKIM memory (U.S.). Program Vehicle Identification Number (VIN) into SKIM memory. Transfer vehicle unique secret key data from PCM. This process will require SKIM to be in SECURED ACCESS mode.
  6. PIN must be entered into scan tool before SKIM will enter SECURED ACCESS mode. Once SECURED ACCESS mode is active, SKIM will remain in that mode for 60 seconds.
  7. Program all sentry keys into SKIM memory. This requires that SKIM be in SECURED ACCESS mode. SKIM will immediately exit SECURED ACCESS mode after each sentry key is programmed.
  8. Ensure all accessories are off and battery is fully charged. Turn ignition switch to ON position. Using scan tool, erase DTCs from all modules.
  9. Start engine and let idle for 2 minutes. Operate malfunctioning system. Turn ignition switch to OFF position and wait 5 seconds. Turn ignition switch to ON position. Check for DTCs. If any DTCs exist, perform appropriate test in accordance with DTC retrieved. See DIAGNOSTIC TROUBLE CODE DEFINITIONS  table under SELF-DIAGNOSTIC SYSTEM. If DTCs do not exist, repair is complete.